Preview

Pre Phd Syllabus Hntuk

Satisfactory Essays
Open Document
Open Document
742 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Pre Phd Syllabus Hntuk
prephdsyllabus
D.SRINIVAS
10022PO538 Paper I - Subjects

R10PPCSG1.1 Advanced Databases

R10PPCSG1.2 Artificial Intelligence & Soft Computing

R10PPCSG1.3 Code Optimization

R10PPCSG1.4 Data Mining & Knowledge Discovery

R10PPCSG1.5 Digital Image Processing

R10PPCSG1.6 Distributed Computing

R10PPCSG1.7 Distributed Databases

R10PPCSG1.8 Distributed Operating System

R10PPCSG1.9 ERP & Supply Chain Management

R10PPCSG1.10 Human Computer Interaction

R10PPCSG1.11 Information Retrieval

R10PPCSG1.12 Multi-Media Application Development

R10PPCSG1.13 Network Security

R10PPCSG1.14 Object Oriented Software Engineering

R10PPCSG1.15 Soft Computing

R10PPCSG1.13 NETWORK SECURITY

Unit I: Introduction to Network Security:

Attacks, services, Security. A model of Inter network Security, Steganography, One time PADS.

Unit II: Basic and ESOTERIC Cryptographic Protocols:

Key Exchange, Authentication, Formal Analysis of Authentication and key Exchange Protocols, Multiple & Public Key Cryptography, Secret Splitting & Sharing Secure elections, Secure multiparty, Communication, Digital Cash.

Unit III: Crypto Graphic Algorithms (Block Cipher):

RC2, GOST, CAST, BLOW FISH, SAFEER, RC5, NEWDES, CRAB, Theory of Block Cipher design.

Unit IV: Key Management:

Key lengths, Generating Keys, Transferring, Verification, Updating, Storing, Backup, Compromised, Lifetime of, Destroying Keys, Public key Management.

Unit V: Digital Signature Algorithms:

Digital Signature, DSA, DSA variants, Gost, Discrete Lagorithm, One – Schnorr – Shamir digital Signatures, Esign, Cellular Automata.

Unit VI: Mails:

Electronic Mail & IO Security good Privacy, SIMIME, IP Security Architecture, Authentication Header, Encapsulating Security, Pay load Key Management Issues.

Unit VII: Security:

Web Security Web Security requirements, Secure Sockets

You May Also Find These Documents Helpful

  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Fall 2014 Syllabus

    • 2082 Words
    • 17 Pages

    In addition to twice-a-week lectures, students meet once a week in a smaller lab section led by a teaching…

    • 2082 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    The purpose of this course is to familiarize the student with the basic concepts of Geology.…

    • 1344 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    A PKI is made up of hardware, applications, policies, services, programming interfaces, cryptographic algorithms, protocols, users, and utilities.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    1)Data protection: Ensure all information is stored in a secure place and no information is given out if unsure.…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Uni 220 Syllabus

    • 1572 Words
    • 7 Pages

    UNI220: Academic Refresher is a one-credit hour course designed to assist students in creating strategies for success in their academic lives. The unique course employs dynamic in-class activities, collaborative learning, supplemental instruction (SI), and journal writing which requires consistent reflection and participation. The course is taught from an “organic perspective,” which is student/content centered. Students are the most important contributors to the educational environment. To enable the students and the instructor to have frequent and meaningful interaction with each other and with the group, class size is limited to 20 students per section. You will receive a letter grade for UNI 220, but no +/- will be granted…

    • 1572 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Course Syllabus

    • 617 Words
    • 3 Pages

    AACJ 013 Track A If you list on your admissions application 24 or more previous college credits, you must take GEN/105 Skills for Learning in an Information Age as the first course and are not required to enroll in the First-Year Sequence. AACJ 013 Track B If you list on your admissions application less than 24 college credits, you must complete the following First-Year Sequence: US/101 Introduction to University Studies (Required as first course) 3 credits SCI/162 Principles of Health and Wellness 3 credits FP/101 Foundations of Personal Finance 3 credits COM/155 University Composition and Communication I 3 credits *COM/156 University Composition and Communication II 3 credits PSY/201 Foundations of Psychology 3 credits *HUM/111 Critical and Creative Thinking (Required as last course) 3 credits AACJ 013 (Tracks A & B) Criminal Justice Concentration *CJS 200 Foundations of the Criminal Justice System 3 credits *CJS 210 Fundamentals of Policing 3 credits *CJS 220 Introduction to Criminal Court System 3 credits *CJS 230 Introduction to Corrections 3 credits *CJS 240 Introduction to Juvenile Justice 3 credits *CJS 250 Introduction to Security 3 credits Subtotal 18 credits General Education Requirements: Communication Arts [Must include COM/150 and COM/220 (Track A) or COM/155 and COM/156 (Track B)] 6 credits Mathematics (Must be MAT/116 or higher to satisfy requirement) 6 credits Science and Technology [Must include 3 credits in the physical or biological sciences (Track A) or SCI/162 (Track B)] 6 credits Humanities [Must include CRT/205 (Track A) or HUM/111 (Track B)] 6 credits…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Syllabus Fall 2014 ND

    • 748 Words
    • 3 Pages

    Write a typed rough and final draft for each assignment and demonstrate significant revision between drafts.…

    • 748 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Course Syllabus

    • 2081 Words
    • 14 Pages

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2081 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    Course Syllabus

    • 886 Words
    • 4 Pages

    Worth, M. (2011). Non-profit management: Principles and practice (2nd ed.). Thousand Oaks, CA: Sage Publications. ISBN: 9781412994453.…

    • 886 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    usrt

    • 392 Words
    • 2 Pages

    Encryption can be a useful deterrent in keeping sensitive information out of the hands of those not authorized and for maintaining the security of a network. Some encryption schemes utilize a secret key and a public key. Each person on the protected network has both a public and a secret key. Everyone who wants to be able to send encrypted information to another person on the network uses the public key. The recipient then uses a secret key to decrypt the information sent. A user must have a secret key to unlock the information.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays